We release patches for security vulnerabilities for the following versions:
| Version | Supported |
|---|---|
| 0.1.x | ✅ |
The Hector team takes security seriously. We appreciate your efforts to responsibly disclose your findings.
If you discover a security vulnerability, please report it by:
- Email: Send details to the project maintainers (see AUTHORS or package metadata)
- Do NOT open a public GitHub issue for security vulnerabilities
- Include as much information as possible:
- Description of the vulnerability
- Steps to reproduce
- Potential impact
- Suggested fix (if available)
- Initial Response: We aim to acknowledge receipt within 48 hours
- Status Updates: We will provide updates on the investigation within 7 days
- Resolution: We will work to address confirmed vulnerabilities as quickly as possible
- Critical: within 7 days
- High: within 30 days
- Medium/Low: within 90 days
- We will confirm receipt of your vulnerability report
- We will investigate and validate the issue
- We will develop and test a fix
- We will release a security patch and credit you (if desired)
- We will publish a security advisory
When deploying Hector:
- Environment Variables: Never commit
.envfiles or secrets to version control - Dependencies: Regularly run
pip-auditto check for vulnerable dependencies - Updates: Keep dependencies up to date
- Access Control: Restrict access to production environments
- Monitoring: Monitor logs for suspicious activity
- HTTPS: Always use HTTPS in production
- Input Validation: Validate and sanitize all user inputs
This project uses automated security scanning:
- Dependency Auditing:
pip-auditruns in CI/CD pipeline - Code Quality: Ruff linting and MyPy type checking
- GitHub Security: Dependabot alerts enabled
- We follow responsible disclosure practices
- Security advisories will be published after fixes are released
- We credit security researchers (unless they prefer to remain anonymous)
For security concerns, contact the project maintainers listed in the repository.